Sponsored Content
Full Discussion: locking a users file as root
Operating Systems Solaris locking a users file as root Post 302294763 by congngo on Thursday 5th of March 2009 07:48:06 PM
Old 03-05-2009
how can an user modify a file that own by root??
You can write a little script to overwrite that file everynight. Eventually they will get tired of change it.
 

10 More Discussions You Might Find Interesting

1. AIX

Locking a file when using VI to prevent multiple-edit sessions by diff users

At the office, we often have to edit one file with VI. We are 4-6 workers doing it and sometimes can be done at the same time. We have found a problem and want to prevent it with a file lock. Is it possible and how ? problem : Worker-a starts edit VI session on File-A at 1PM Worker-b... (14 Replies)
Discussion started by: Browser_ice
14 Replies

2. Solaris

Root ENV is different from users', how to change?

Hello, I'm working on a Solaris 9 machine. I found the root's environment variables (say, $PATH, $ORACLE_HOME, big problem) were set differently from the users'. All regular users use C shell now and share the same environment file stored in /usr/local/config/cshrc.default. Should I just use... (4 Replies)
Discussion started by: alanlh
4 Replies

3. SCO

Non-Root Users Unable to Print

UnixWare 7, Release 7.1.3 We have a customer that has frequent issues with Non-Root users being unable to print. They are able to print w/o issues, but all of the sudden it stops working. The only workaround we have at this point is to reboot the server. It is happening weekly according to... (1 Reply)
Discussion started by: cfshd
1 Replies

4. Solaris

Prevent users logging in as root

I would like to know how to prevent users connecting to a server using SSH as root. I would still like them to be able to login with their username and then change to su. But I would like to prevent them logging in directly as root. I have searched the forum and read that I should set... (3 Replies)
Discussion started by: Sepia
3 Replies

5. UNIX for Dummies Questions & Answers

tracking root users

Hi everyone hope you can help me i have 5 root users and the problem with that is how can you see witch root user did what on the box how can you track the users that played on the servers. 1) What commands they typed (in linux you get history ) 2) From witch ip did they connect to the server (3 Replies)
Discussion started by: sucram
3 Replies

6. UNIX Desktop Questions & Answers

Too many users with root password

Hi there, I'm working with a Linux server and now I can get a daily Logwatch mail ... my question is:since there are too many users with root password (...in my opinion... :mad:) how could I prevent to delete information about "su" log? Thanks in advance, GB (3 Replies)
Discussion started by: Giordano Bruno
3 Replies

7. Solaris

Sendmail locking root

Hi, we are running on Solaris 10 and I see that under /usr/mail -rw-rw---- 1 root mail 0 Nov 26 11:19 root -rw------- 1 root mail 2 Nov 24 17:14 root.lock -rw------- 1 root mail 2 Nov 27 09:26 root4_aGD6 -rw------- 1 root mail 2 Nov 27 09:26 rootHAaqyo -rw------- 1 root mail 2 Nov 27 09:26... (6 Replies)
Discussion started by: manni2
6 Replies

8. Solaris

How to restrict rm -rf * to users other than root?

I'm using Solaris 10. I want to restrict users from executing this dangerous command. rm -rf * But they should be able to perform the below actions: rm -rf *.* rm -rf filename rm -rf directory Is it possible? If yes then pls let me know how to do it? (7 Replies)
Discussion started by: Arun_Linux
7 Replies

9. UNIX for Dummies Questions & Answers

Not able to switch to other users using su -user from root

Hi all, I have a small problem. When I log in as root and try to switch to any other user using su -user, then it is giving an error saying libncurses.so permission denied. Can you help me? Thank you in advance. Sai. (1 Reply)
Discussion started by: sai2krishna
1 Replies

10. Shell Programming and Scripting

Find users with root UID or GID or root home

I need to list users in /etc/passwd with root's GID or UID or /root as home directory If we have these entries in /etc/passwd root:x:0:0:root:/root:/bin/bash rootgooduser1:x:100:100::/home/gooduser1:/bin/bash baduser1:x:0:300::/home/baduser1:/bin/bash... (6 Replies)
Discussion started by: anil510
6 Replies
userdbset(1M)															     userdbset(1M)

NAME
userdbset - modify information in the user database, /var/adm/userdb SYNOPSIS
name attr [attr]... attr [attr]... name] DESCRIPTION
modifies the per-user information residing in the user database, A per-user value in the user database overrides any system-wide default configured in See userdb(4) and security(4) for more details about the user database and system-wide defaults, respectively. If one or more arguments are specified on the command line, initializes or modifies each attribute specified by attr to the specified value for the specified user name. Options The following options are recognized: Modify specified attributes for all users. Delete attributes; the (see security(4)) system-wide default will then apply. If one or more attr arguments are specified, only those attributes are deleted. Otherwise, if no attr arguments are specified, all configurable attributes are deleted for the specified user name. Import the contents of filename into the user database. Each line in the data file, filename, must be in the following format: The output of is in this format and can be used as the input file. See the example in the section. Remove internal attributes in addition to the configurable ones. Internal attributes are not user configurable and are normally modified only by programs that enforce system security. The file indicates which attributes are configurable and which are internal. Initialize, modify or delete specified attributes for the specified user name. Authorizations In order to invoke the user must either be root (running with effective uid of 0) or, if the Role-Based Access Control Extensions product (RBACExt) is installed, have the appropriate authorization(s). Users with the appropriate authorizations can use to add, modify or delete security attributes for other users, but are prohibited from changing the security attributes for local root users. Only root users can add, modify or delete the security attributes of local root users. Refer to rbac(5) for more information on the Role-Based Access Control product. The following is a list of the required authorizations for running with particular options: Allows the user to invoke The user will also need specific authorizations to modify or delete the various attributes in the user database. Allows the user to delete the per-user attribute (attr) named in the object of the authorization pair. An object of will allow the user to delete any attribute. Allows the user to initialize or modify the per-user attribute (attr) named in the object of the authorization pair. An object of will allow the user to initialize or modify any attribute. Allows the user to import user attributes into the user database using the option. Users with this authorization are allowed to import attributes for all users, including local root users. Notes Only users who have read and write access to can run validates attributes and attribute values based on information in The validation of an attribute fails if: o Any specified attr is not listed in o does not allow a per-user value for the attr. o name is not a valid user. o allows the attr only for local users, and name is not in o The value of an attr is not within the range specified in RETURN VALUE
exits with one of the following values: success invalid user invalid usage insufficient permission to access the user database file system error invalid attribute; does not allow a per-user value an attribute value is not within the range specified in block overflow entry overflow database lock failure database is disabled; see userdb(4) invalid user name not a local user EXAMPLES
In the following example, the first command deletes all of the configurable attributes for user while retaining the internal attributes. At this point, the system-wide defaults in apply. The second command sets minimum password length to 7 and to 0022 (the leading zero denotes an octal value). The next command deletes the minimum password length, which causes the system-wide default to be used. The following example deletes the user-specific audit flag for all users. The system-wide default will then apply for all users. The following example saves the configurable attributes for all users option) into a file, using the command. If needed, the attributes can then be restored at a later point by importing the file with The second command imports the configurable attributes into the user data- base. FILES
user database security defaults configuration file security attributes description file SEE ALSO
userdbck(1M), userdbget(1M), userdb_read(3), security(4), userdb(4), rbac(5). userdbset(1M)
All times are GMT -4. The time now is 09:37 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy